反编译 .NET 2.0 二进制文件
是否可以将 .NET 2.0 二进制文件 (*.exe) 反编译为某种可读代码?或者如果没有,只是从中提取一些信息(例如方法名称、调试信息等)?
Is it possible to decompile a .NET 2.0 binary file (*.exe) to some sort of readable code? Or if not, just extract some information from it (for example method names, debugging information, etc.)?
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(5)
您可能需要查看 Reflector,它应该向您显示 C# 或伊利诺伊州。
编辑:
随着 Reflector 成本的增加,我已切换到 ILSpy 来满足我的日常需求。
You might want to look at Reflector, it should show you the assembly as C# or IL.
EDIT:
With the increased cost of Reflector, I have switched to ILSpy for my day to day needs.
将 exe 放入 ILDASM 或 Dot Net Reflector 应该可以解决问题。
Dropping the exe into ILDASM or Dot Net Reflector should do the trick.
搜索 Lutz Roeder,您会发现:
http://www.red-gate.com /产品/反射器/
Search for Lutz Roeder and you'll find :
http://www.red-gate.com/products/reflector/
我将引用我自己的今天早些时候提出的问题:
关于 C#,您已经获得了很多很棒的工具,例如 Reflector。但是,如果代码被混淆,您将在阅读时遇到问题。
I will Quote myself from this question earlier today:
Regarding C#, you have already been given a lot of great tools like Reflector. However, if the Code is obfuscated you are going to have problems reading it.
是的。首先,所有 .net 库都有包含类型信息的清单。可以使用反射或使用反射器等工具来有问题地询问它们。查看您需要查看的类的 system.reflection 命名空间。
Yes. First all .net libraries have manifests with type information it them. They can be interrogated problematically using reflection, or by using tools like reflector. Take a look at the system.reflection namespace for the classes you will need to take a look at.